IMSI privacy protection method in 5G high-security terminal

A security terminal and privacy protection technology, applied in the field of IMSI privacy protection inside 5G high-security terminals, can solve problems such as leakage of user identity, and achieve the effect of wide application, solving identity privacy protection, and protecting identity privacy.

Inactive Publication Date: 2018-10-09
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the IMSI read by the application is stolen by the attacker, there is also the possibility of leaking the user's identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IMSI privacy protection method in 5G high-security terminal
  • IMSI privacy protection method in 5G high-security terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In the current ordinary terminal, the application program reads the IMSI information stored in the SIM card, and only needs to call an API interface function. Aiming at the possibility that reading IMSI information by an application program in an ordinary terminal may lead to leakage of user identity privacy, the present invention provides a privacy protection method for IMSI information in a high-security terminal. The main purpose is to protect the anonymity of the IMSI through the anonymization algorithm to prevent the leakage of the real IMSI information and other sensitive information stored in the SIM card.

[0014] In order to realize the privacy protection function of the present invention, two functional modules need to be added in the terminal: an anonymization algorithm module and a privacy configuration module. The main function of the anonymization algorithm module is to anonymize the IMSI information to ensure the privacy and security of the IMSI informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IMSI privacy protection method in a 5G high-security terminal. An anonymization algorithm module and a privacy configuration module are additionally provided in the terminal, wherein the main function of the anonymization algorithm module is to perform anonymous processing on IMSI information, and the main function of the privacy configuration module is to selectively activate or close the anonymization algorithm module for application programs of different security levels. According to the IMSI privacy protection method provided by the invention, the privacy of theIMSI is ensured in the high-security terminal by using the anonymization algorithm so as to reduce the possibility of an attacker of capturing the IMSI information through the application programs ofthe terminal, so that the identity privacy of a user of the high-security terminal is protected. The application range of the method is wide, the method is not only suitable for the high-security terminals in the current 4G network, but also is suitable for the high-security terminals in the future 5G network. The requirements of identity privacy protection of users in the high-security industriescan be satisfied. The anonymization algorithm can also be extended to protect the identity information of other terminals.

Description

technical field [0001] The invention relates to a method for protecting IMSI privacy inside a 5G high-security terminal. Background technique [0002] Since 2015, ITU, 3GPP and other international telecommunication organizations have formulated requirements, standards and other schedules for 5G, and the world's leading telecom operators have also started to invest in 5G network trials in 2016. Operators plan to launch early 5G commercial services in 2018, and after three to four years of trials, they will realize 5G networks built with 5G standard technology proposed by 3GPP in 2021, and the world will officially enter the era of 5G services. [0003] 5G networks need to provide differentiated security services for different business scenarios, and be able to adapt to various network access methods and new network architectures. These new scenarios, new architectures, and new technologies all have higher privacy protection requirements for future 5G networks. Focusing on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L29/06
CPCH04L63/0421H04W12/02
Inventor 范子君田永春王俊曾浩洋
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products